What You Need to Know about the Zerologon Vulnerability

A critical vulnerability in the Microsoft Netlogon Remote Protocol is leaving some companies open to attack. Here is what you need to know to determine if your company is at risk from the Zerologon vulnerability and, if so, what you can do to protect it.

Smishing and Vishing and Whaling — Oh My

Smishing, vishing, and whaling might sound ominous, but they are simply terms used to describe different types of phishing attacks. Find out how these attacks differ from the classic phishing scam.

New Tactic Is Bringing Ransomware Extortion to a Whole New Level

Cybergangs continually look for new ways to make their ransomware campaigns more effective, but sometimes they just seem to fall in their lap. Learn how ransomware attacks in South Africa’s largest city, Johannesburg, eventually led to a new extortion tactic that is already paying off.

Securing APIs for Better Business

Creating a secure architecture while developing APIs (Application Programming Interface) is critical for prevention against future cyberattacks.

Vishing Scam Is Targeting Telecommuters

A voice phishing (vishing) scam that targets employees working from home is making the rounds. Learn how this scam works and what your company can do to avoid becoming the next victim.

5 Ways to Protect Your Computer Data from Natural Disasters

Especially during a time when more people are working remotely than ever due to the ongoing COVID-19 pandemic, it’s important to acknowledge that the data you’re creating and working with at home is NOT protected in the same way that same information would be in the office.